CINXE.COM
(PDF) [Dis-]Informing the People's Discretion: Judicial Deference Under The National Security Exemption of the Freedom of Information Act | Tom Ginsburg - Academia.edu
<!DOCTYPE html> <html > <head> <meta charset="utf-8"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <meta content="width=device-width, initial-scale=1" name="viewport"> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs"> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="htN7Sw3R72+matJJ4jS3l/E83aE3RKNHYjZ2d5btaXbnJRL+87L9e37pk3g3oAKSaogWHtzFQ2Sq6UqPdcrOIA==" /> <meta name="citation_title" content="[Dis-]Informing the People&#39;s Discretion: Judicial Deference Under The National Security Exemption of the Freedom of Information Act" /> <meta name="citation_publication_date" content="2017/01/01" /> <meta name="citation_author" content="Tom Ginsburg" /> <meta name="twitter:card" content="summary" /> <meta name="twitter:url" content="https://www.academia.edu/76750118/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_The_National_Security_Exemption_of_the_Freedom_of_Information_Act" /> <meta name="twitter:title" content="[Dis-]Informing the People's Discretion: Judicial Deference Under The National Security Exemption of the Freedom of Information Act" /> <meta name="twitter:description" content="As noted by President Obama’s recent Review Group on Intelligence and Communications Technologies, pervasive state surveillance has never been more feasible. There has been an inexorable rise in the size and reach of the national security bureaucracy" /> <meta name="twitter:image" content="https://0.academia-photos.com/3808603/4244859/9211711/s200_tom.ginsburg.jpg" /> <meta property="fb:app_id" content="2369844204" /> <meta property="og:type" content="article" /> <meta property="og:url" content="https://www.academia.edu/76750118/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_The_National_Security_Exemption_of_the_Freedom_of_Information_Act" /> <meta property="og:title" content="[Dis-]Informing the People's Discretion: Judicial Deference Under The National Security Exemption of the Freedom of Information Act" /> <meta property="og:image" content="http://a.academia-assets.com/images/open-graph-icons/fb-paper.gif" /> <meta property="og:description" content="As noted by President Obama’s recent Review Group on Intelligence and Communications Technologies, pervasive state surveillance has never been more feasible. There has been an inexorable rise in the size and reach of the national security bureaucracy" /> <meta property="article:author" content="https://chicago.academia.edu/TomGinsburg" /> <meta name="description" content="As noted by President Obama’s recent Review Group on Intelligence and Communications Technologies, pervasive state surveillance has never been more feasible. There has been an inexorable rise in the size and reach of the national security bureaucracy" /> <title>(PDF) [Dis-]Informing the People's Discretion: Judicial Deference Under The National Security Exemption of the Freedom of Information Act | Tom Ginsburg - Academia.edu</title> <link rel="canonical" href="https://www.academia.edu/76750118/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_The_National_Security_Exemption_of_the_Freedom_of_Information_Act" /> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "single_work", 'action': "show", 'controller_action': 'single_work#show', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script> var $controller_name = 'single_work'; var $action_name = "show"; var $rails_env = 'production'; var $app_rev = 'c7c923e13c2d00b99cbe85c9159af2026a636b1c'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.require = { config: function() { return function() {} } } </script> <script> window.Aedu = window.Aedu || {}; window.Aedu.hit_data = null; window.Aedu.serverRenderTime = new Date(1732702429000); window.Aedu.timeDifference = new Date().getTime() - 1732702429000; </script> <script type="application/ld+json">{"@context":"https://schema.org","@type":"ScholarlyArticle","abstract":"As noted by President Obama’s recent Review Group on Intelligence and Communications Technologies, pervasive state surveillance has never been more feasible. There has been an inexorable rise in the size and reach of the national security bureaucracy since it was created after World War II, as we have gone through the Cold War and the War on Terror. No one doubts that our national security bureaucracies need to gain intelligence and keep some of it secret. But the consensus of decades of experts, both insiders and outsiders, is that there is rampant overclassification by government agencies. From its inception in 1966, the Freedom of Information Act (FOIA) has presumed disclosure. And from its inception, Congress intended the federal courts to act as a brake on unfettered agency discretion regarding classification. But courts have not played a strong role in this regard. This Article examines the interplay of overclassification, excessive judicial deference, and illusory agency expe...","author":[{"@context":"https://schema.org","@type":"Person","name":"Tom Ginsburg"}],"contributor":[],"dateCreated":"2022-04-17","dateModified":null,"datePublished":"2017-01-01","headline":"[Dis-]Informing the People's Discretion: Judicial Deference Under The National Security Exemption of the Freedom of Information Act","inLanguage":"en","keywords":["Law","Courts","Administrative Law","Judiciary"],"locationCreated":null,"publication":null,"publisher":{"@context":"https://schema.org","@type":"Organization","name":"Center for Open Science"},"image":null,"thumbnailUrl":null,"url":"https://www.academia.edu/76750118/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_The_National_Security_Exemption_of_the_Freedom_of_Information_Act","sourceOrganization":[{"@context":"https://schema.org","@type":"EducationalOrganization","name":"chicago"}]}</script><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/single_work_page/loswp-102fa537001ba4d8dcd921ad9bd56c474abc201906ea4843e7e7efe9dfbf561d.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/body-8d679e925718b5e8e4b18e9a4fab37f7eaa99e43386459376559080ac8f2856a.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/text_button-73590134e40cdb49f9abdc8e796cc00dc362693f3f0f6137d6cf9bb78c318ce7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> </head> <body> <div id='react-modal'></div> <div class="js-upgrade-ie-banner" style="display: none; text-align: center; padding: 8px 0; background-color: #ebe480;"><p style="color: #000; font-size: 12px; margin: 0 0 4px;">Academia.edu no longer supports Internet Explorer.</p><p style="color: #000; font-size: 12px; margin: 0;">To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.querySelector('.js-upgrade-ie-banner').style.display = 'block'; }</script> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "08029c1cfb3b90077a2a431e7d801aa4f0fc8dacb97e641dbb89f79052231f82", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="jqu6ZH4kQu2h+hte8+sj+pPYJY3T7w69X9JPxZ8UTBfvXdPRgEdQ+Xl5Wm8mf5b/CGzuMjhu7p6XDXM9fDPrQQ==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/76750118/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_The_National_Security_Exemption_of_the_Freedom_of_Information_Act" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="d2k5fpY2C/Iokcz6EHWRLXL3Ssej8rbgFfcx+eS97T8Wn1DLaFUZ5vASjcvF4SQo6UOBeEhzVsPdKA0BB5pKaQ==" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><input class="btn btn-primary btn-block g-recaptcha js-password-reset-submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" type="submit" value="Email me a link" /></form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script> <div class="header--container" id="main-header-container"><div class="header--inner-container header--inner-container-ds2"><div class="header-ds2--left-wrapper"><div class="header-ds2--left-wrapper-inner"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="hide-on-desktop-redesign" style="height: 24px; width: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hide-on-mobile-redesign" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a><div class="header--search-container header--search-container-ds2"><form class="js-SiteSearch-form select2-no-default-pills" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><svg style="width: 14px; height: 14px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="search" class="header--search-icon svg-inline--fa fa-search fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z"></path></svg><input class="header--search-input header--search-input-ds2 js-SiteSearch-form-input" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" /></form></div></div></div><nav class="header--nav-buttons header--nav-buttons-ds2 js-main-nav"><a class="ds2-5-button ds2-5-button--secondary js-header-login-url header-button-ds2 header-login-ds2 hide-on-mobile-redesign" href="https://www.academia.edu/login" rel="nofollow">Log In</a><a class="ds2-5-button ds2-5-button--secondary header-button-ds2 hide-on-mobile-redesign" href="https://www.academia.edu/signup" rel="nofollow">Sign Up</a><button class="header--hamburger-button header--hamburger-button-ds2 hide-on-desktop-redesign js-header-hamburger-button"><div class="icon-bar"></div><div class="icon-bar" style="margin-top: 4px;"></div><div class="icon-bar" style="margin-top: 4px;"></div></button></nav></div><ul class="header--dropdown-container js-header-dropdown"><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/login" rel="nofollow">Log In</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/signup" rel="nofollow">Sign Up</a></li><li class="header--dropdown-row js-header-dropdown-expand-button"><button class="header--dropdown-button">more<svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="caret-down" class="header--dropdown-button-icon svg-inline--fa fa-caret-down fa-w-10" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z"></path></svg></button></li><li><ul class="header--expanded-dropdown-container"><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/about">About</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/press">Press</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://medium.com/@academia">Blog</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/documents">Papers</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/terms">Terms</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/privacy">Privacy</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/copyright">Copyright</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/hiring"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="header--dropdown-row-icon svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>We're Hiring!</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://support.academia.edu/"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="header--dropdown-row-icon svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>Help Center</a></li><li class="header--dropdown-row js-header-dropdown-collapse-button"><button class="header--dropdown-button">less<svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="caret-up" class="header--dropdown-button-icon svg-inline--fa fa-caret-up fa-w-10" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z"></path></svg></button></li></ul></li></ul></div> <script src="//a.academia-assets.com/assets/webpack_bundles/fast_loswp-bundle-d651820c1939e5287fa830883d89f986bbe9f35a9f42a5371043c36c78a32b4f.js" defer="defer"></script><script>window.loswp = {}; window.loswp.author = 3808603; window.loswp.bulkDownloadFilterCounts = {}; window.loswp.hasDownloadableAttachment = true; window.loswp.hasViewableAttachments = true; // TODO: just use routes for this window.loswp.loginUrl = "https://www.academia.edu/login?post_login_redirect_url=https%3A%2F%2Fwww.academia.edu%2F76750118%2F_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_The_National_Security_Exemption_of_the_Freedom_of_Information_Act%3Fauto%3Ddownload"; window.loswp.translateUrl = "https://www.academia.edu/login?post_login_redirect_url=https%3A%2F%2Fwww.academia.edu%2F76750118%2F_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_The_National_Security_Exemption_of_the_Freedom_of_Information_Act%3Fshow_translation%3Dtrue"; window.loswp.previewableAttachments = [{"id":84892923,"identifier":"Attachment_84892923","shouldShowBulkDownload":false}]; window.loswp.shouldDetectTimezone = true; window.loswp.shouldShowBulkDownload = true; window.loswp.showSignupCaptcha = false window.loswp.willEdgeCache = false; window.loswp.work = {"work":{"id":76750118,"created_at":"2022-04-17T15:55:32.707-07:00","from_world_paper_id":202174157,"updated_at":"2022-05-04T04:34:24.416-07:00","_data":{"abstract":"As noted by President Obama’s recent Review Group on Intelligence and Communications Technologies, pervasive state surveillance has never been more feasible. There has been an inexorable rise in the size and reach of the national security bureaucracy since it was created after World War II, as we have gone through the Cold War and the War on Terror. No one doubts that our national security bureaucracies need to gain intelligence and keep some of it secret. But the consensus of decades of experts, both insiders and outsiders, is that there is rampant overclassification by government agencies. From its inception in 1966, the Freedom of Information Act (FOIA) has presumed disclosure. And from its inception, Congress intended the federal courts to act as a brake on unfettered agency discretion regarding classification. But courts have not played a strong role in this regard. This Article examines the interplay of overclassification, excessive judicial deference, and illusory agency expe...","publisher":"Center for Open Science","publication_date":"2017,,"},"document_type":"paper","pre_hit_view_count_baseline":null,"quality":"high","language":"en","title":"[Dis-]Informing the People's Discretion: Judicial Deference Under The National Security Exemption of the Freedom of Information Act","broadcastable":true,"draft":null,"has_indexable_attachment":true,"indexable":true}}["work"]; window.loswp.workCoauthors = [3808603]; window.loswp.locale = "en"; window.loswp.countryCode = "SG"; window.loswp.cwvAbTestBucket = ""; window.loswp.designVariant = "ds_vanilla"; window.loswp.fullPageMobileSutdModalVariant = "full_page_mobile_sutd_modal"; window.loswp.useOptimizedScribd4genScript = false; window.loswp.appleClientId = 'edu.academia.applesignon';</script><script defer="" src="https://accounts.google.com/gsi/client"></script><div class="ds-loswp-container"><div class="ds-work-card--grid-container"><div class="ds-work-card--container js-loswp-work-card"><div class="ds-work-card--cover"><div class="ds-work-cover--wrapper"><div class="ds-work-cover--container"><button class="ds-work-cover--clickable js-swp-download-button" data-signup-modal="{"location":"swp-splash-paper-cover","attachmentId":84892923,"attachmentType":"pdf"}"><img alt="First page of “[Dis-]Informing the People's Discretion: Judicial Deference Under The National Security Exemption of the Freedom of Information Act”" class="ds-work-cover--cover-thumbnail" src="https://0.academia-photos.com/attachment_thumbnails/84892923/mini_magick20220707-32612-1oqqksv.png?1657261112" /><img alt="PDF Icon" class="ds-work-cover--file-icon" src="//a.academia-assets.com/assets/single_work_splash/adobe.icon-574afd46eb6b03a77a153a647fb47e30546f9215c0ee6a25df597a779717f9ef.svg" /><div class="ds-work-cover--hover-container"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span><p>Download Free PDF</p></div><div class="ds-work-cover--ribbon-container">Download Free PDF</div><div class="ds-work-cover--ribbon-triangle"></div></button></div></div></div><div class="ds-work-card--work-information"><h1 class="ds-work-card--work-title">[Dis-]Informing the People's Discretion: Judicial Deference Under The National Security Exemption of the Freedom of Information Act</h1><div class="ds-work-card--work-authors ds-work-card--detail"><a class="ds-work-card--author js-wsj-grid-card-author ds2-5-body-md ds2-5-body-link" data-author-id="3808603" href="https://chicago.academia.edu/TomGinsburg"><img alt="Profile image of Tom Ginsburg" class="ds-work-card--author-avatar" src="https://0.academia-photos.com/3808603/4244859/9211711/s65_tom.ginsburg.jpg" />Tom Ginsburg</a></div><div class="ds-work-card--detail"><p class="ds-work-card--detail ds2-5-body-sm">2017</p></div><p class="ds-work-card--work-abstract ds-work-card--detail ds2-5-body-md">As noted by President Obama’s recent Review Group on Intelligence and Communications Technologies, pervasive state surveillance has never been more feasible. There has been an inexorable rise in the size and reach of the national security bureaucracy since it was created after World War II, as we have gone through the Cold War and the War on Terror. No one doubts that our national security bureaucracies need to gain intelligence and keep some of it secret. But the consensus of decades of experts, both insiders and outsiders, is that there is rampant overclassification by government agencies. From its inception in 1966, the Freedom of Information Act (FOIA) has presumed disclosure. And from its inception, Congress intended the federal courts to act as a brake on unfettered agency discretion regarding classification. But courts have not played a strong role in this regard. This Article examines the interplay of overclassification, excessive judicial deference, and illusory agency expe...</p><div class="ds-work-card--button-container"><button class="ds2-5-button js-swp-download-button" data-signup-modal="{"location":"continue-reading-button--work-card","attachmentId":84892923,"attachmentType":"pdf","workUrl":"https://www.academia.edu/76750118/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_The_National_Security_Exemption_of_the_Freedom_of_Information_Act"}">See full PDF</button><button class="ds2-5-button ds2-5-button--secondary js-swp-download-button" data-signup-modal="{"location":"download-pdf-button--work-card","attachmentId":84892923,"attachmentType":"pdf","workUrl":"https://www.academia.edu/76750118/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_The_National_Security_Exemption_of_the_Freedom_of_Information_Act"}"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span>Download PDF</button></div></div></div></div><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-doc_id="84892923" data-landing_url="https://www.academia.edu/76750118/_Dis_Informing_the_Peoples_Discretion_Judicial_Deference_Under_The_National_Security_Exemption_of_the_Freedom_of_Information_Act" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><div class="ds-top-related-works--grid-container"><div class="ds-related-content--container ds-top-related-works--container"><h2 class="ds-related-content--heading">Related papers</h2><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="0" data-entity-id="44696448" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/44696448/Striking_a_Balance_Between_National_Security_and_the_Civil_Right_to_Privacy_Improving_National_Security_Intelligence_Oversight_in_the_US">Striking a Balance Between National Security & the Civil Right to Privacy: Improving National Security Intelligence Oversight in the US</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="80673372" href="https://ubc.academia.edu/JackMagnus">Jack P . D . Magnus</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2020</p><p class="ds-related-work--abstract ds2-5-body-sm">National security intelligence collection is defined by secrecy and covert data collection. Methods of data collection and processing have developed rapidly along with advances in technology and data encryption. Activities undertaken by national security intelligence organizations such as the CIA and NSA serve to thwart potential threats to the US, warn allies of disruptive international developments, and predict the proximate reality of the international balance of power (both between states and non-state entities). In the US there is an ongoing debate, largely induced by the Edward Snowden NSA leaks of 2013, around the constitutionality of data collection and processing on behalf of both national security intelligence organizations and domestic law enforcement. Gaps in legislative, executive, and judicial oversight regarding the constitutionality of intelligence collection arose post-9/11, when reforms led to the expansion of illiberal and undemocratic intelligence collection in the name of national security. In this paper, I contextualize the debate surrounding the balance between national security and the civil right to privacy in the US, justify reforms based on Fourth Amendment principles, and ask what gaps should be addressed and reformed in the current system of US national security intelligence oversight. Proposed reforms are based on past decisions of the European Court of Human Rights (ECtHR) and the European Court of Justice (EUCJ) on the effectiveness of quasi-judicial (i.e. hybrid) systems of oversight involving both legislative and judicial entities.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Striking a Balance Between National Security \u0026 the Civil Right to Privacy: Improving National Security Intelligence Oversight in the US","attachmentId":65411464,"attachmentType":"pdf","work_url":"https://www.academia.edu/44696448/Striking_a_Balance_Between_National_Security_and_the_Civil_Right_to_Privacy_Improving_National_Security_Intelligence_Oversight_in_the_US","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/44696448/Striking_a_Balance_Between_National_Security_and_the_Civil_Right_to_Privacy_Improving_National_Security_Intelligence_Oversight_in_the_US"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="1" data-entity-id="115377742" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/115377742/Secrecy_versus_transparency_in_the_US_national_security_surveillance_state">Secrecy versus transparency in the US national security surveillance state</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="63975951" href="https://uj-pl.academia.edu/Pawe%C5%82Laidler">Paweł Laidler</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Routledge eBooks, 2021</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Secrecy versus transparency in the US national security surveillance state","attachmentId":111802086,"attachmentType":"pdf","work_url":"https://www.academia.edu/115377742/Secrecy_versus_transparency_in_the_US_national_security_surveillance_state","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/115377742/Secrecy_versus_transparency_in_the_US_national_security_surveillance_state"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="2" data-entity-id="37634765" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/37634765/Secrets_and_Lies_Exposed_and_Combatted_Warrantless_Surveillance_Under_and_Around_the_Law_2001_2017">Secrets and Lies—Exposed and Combatted: Warrantless Surveillance Under and Around the Law, 2001–2017</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="665086" href="https://independent.academia.edu/PatriceMcDermott">Patrice McDermott</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Secrecy and Society</p><p class="ds-related-work--abstract ds2-5-body-sm">Before June 2013, civil society and much of Congress were largely in the dark about the extent of the surveillance activities of the National Security Agency and the circumlocutions of statute undertaken by the White House and the Department of Justice. After the releases by Edward Snowden to specific journalists, the mendacity of Intelligence Community lawyers and leaders, the evasions of the law and manipulation of the FISA Court by the White House working with the Justice Department, and the scope of the violations of the Fourth Amendment protections of U.S. Persons (USPs) became increasingly apparent. This article reviews the changes that were initiated in the Executive Branch (and to a lesser extent in the Legislative Branch), the role civil society played in pushing and utilizing greater transparency, and what the changes mean for government accountability to the public.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Secrets and Lies—Exposed and Combatted: Warrantless Surveillance Under and Around the Law, 2001–2017","attachmentId":57619787,"attachmentType":"pdf","work_url":"https://www.academia.edu/37634765/Secrets_and_Lies_Exposed_and_Combatted_Warrantless_Surveillance_Under_and_Around_the_Law_2001_2017","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/37634765/Secrets_and_Lies_Exposed_and_Combatted_Warrantless_Surveillance_Under_and_Around_the_Law_2001_2017"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="3" data-entity-id="1644623" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/1644623/Rays_of_Sunlight_in_a_Shadow_War_FOIA_the_Abuses_of_Anti_Terrorism_and_the_Strategy_of_Transparency">Rays of Sunlight in a Shadow War: FOIA, the Abuses of Anti-Terrorism, and the Strategy of Transparency</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="1925180" href="https://upenn.academia.edu/SethKreimer">Seth Kreimer</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Lewis & Clark L. Rev., 2007</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Rays of Sunlight in a Shadow War: FOIA, the Abuses of Anti-Terrorism, and the Strategy of Transparency","attachmentId":17486623,"attachmentType":"pdf","work_url":"https://www.academia.edu/1644623/Rays_of_Sunlight_in_a_Shadow_War_FOIA_the_Abuses_of_Anti_Terrorism_and_the_Strategy_of_Transparency","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/1644623/Rays_of_Sunlight_in_a_Shadow_War_FOIA_the_Abuses_of_Anti_Terrorism_and_the_Strategy_of_Transparency"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="4" data-entity-id="1644617" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/1644617/Watching_the_watchers_Surveillance_transparency_and_political_freedom_in_the_war_on_terror">Watching the watchers: Surveillance, transparency, and political freedom in the war on terror</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="1925180" href="https://upenn.academia.edu/SethKreimer">Seth Kreimer</a></div><p class="ds-related-work--metadata ds2-5-body-xs">University of Pennsylvania Journal of Constitutional …, 2004</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Watching the watchers: Surveillance, transparency, and political freedom in the war on terror","attachmentId":17486612,"attachmentType":"pdf","work_url":"https://www.academia.edu/1644617/Watching_the_watchers_Surveillance_transparency_and_political_freedom_in_the_war_on_terror","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/1644617/Watching_the_watchers_Surveillance_transparency_and_political_freedom_in_the_war_on_terror"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="5" data-entity-id="69964853" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/69964853/When_the_Curtain_Must_Be_Drawn_American_Experience_with_Proceedings_Involving_Information_That_for_Reasons_of_National_Security_Cannot_Be_Disclosed">When the Curtain Must Be Drawn: American Experience with Proceedings Involving Information That, for Reasons of National Security, Cannot Be Disclosed</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="78020527" href="https://independent.academia.edu/PeterStrauss1">Peter Strauss</a></div><p class="ds-related-work--metadata ds2-5-body-xs">SSRN Electronic Journal</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"When the Curtain Must Be Drawn: American Experience with Proceedings Involving Information That, for Reasons of National Security, Cannot Be Disclosed","attachmentId":79864008,"attachmentType":"pdf","work_url":"https://www.academia.edu/69964853/When_the_Curtain_Must_Be_Drawn_American_Experience_with_Proceedings_Involving_Information_That_for_Reasons_of_National_Security_Cannot_Be_Disclosed","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/69964853/When_the_Curtain_Must_Be_Drawn_American_Experience_with_Proceedings_Involving_Information_That_for_Reasons_of_National_Security_Cannot_Be_Disclosed"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="6" data-entity-id="5186718" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/5186718/FOREWORD_THE_NSA_AND_THE_LEGAL_REGIME_FOR_FOREIGN_INTELLIGENCE_SURVEILLANCE">FOREWORD: THE NSA AND THE LEGAL REGIME FOR FOREIGN INTELLIGENCE SURVEILLANCE</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33534" href="https://osu.academia.edu/PeterShane">Peter M Shane</a></div><p class="ds-related-work--metadata ds2-5-body-xs">I/S: A Journal of Law and Policy for the Information Society, 2014</p><p class="ds-related-work--abstract ds2-5-body-sm">This paper introduces a symposium, published in Volume 10, Issue 2 of I/S: A Journal of Law and Policy for the Information Society, entitled, "NSA Surveillance: Security, Privacy, and Civil Liberty," which is available at http://moritzlaw.osu.edu/students/groups/is/volume-102/. The paper traces the history of electronic surveillance law by way of explaining how our laws have evolved to a stage where lawyers could plausibly defend the government’s entitlement to capture and store an immense volume of our telephone and online communications, as well as metadata about both. It goes on to introduce the other papers in the symposium and concludes by arguing the importance of executive branch acquiescence in such statutory limits as Congress may impose on national security surveillance as it affects Americans. Keywords: NSA, FBI, surveillance, warrantless surveillance, foreign intelligence, fourth amendment</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"FOREWORD: THE NSA AND THE LEGAL REGIME FOR FOREIGN INTELLIGENCE SURVEILLANCE","attachmentId":53999206,"attachmentType":"pdf","work_url":"https://www.academia.edu/5186718/FOREWORD_THE_NSA_AND_THE_LEGAL_REGIME_FOR_FOREIGN_INTELLIGENCE_SURVEILLANCE","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/5186718/FOREWORD_THE_NSA_AND_THE_LEGAL_REGIME_FOR_FOREIGN_INTELLIGENCE_SURVEILLANCE"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="7" data-entity-id="99809899" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/99809899/The_NSA_s_mass_surveillance_program_illegal_and_opaque">The NSA’s mass surveillance program: illegal and opaque</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="230812549" href="https://independent.academia.edu/ToniLocy">Toni Locy</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2015</p><p class="ds-related-work--abstract ds2-5-body-sm">On May 7th a panel of judges of the U.S. Court of Appeals for the Second Circuit ruled that the National Security Agency’s bulk collection of telephone metadata violated the law. Toni Locy writes that the decision is significant in that it would not have occurred but for Edward Snowden’s revelations over this mass surveillance, and that it refutes the government’s arguments that the mass collection of phone records is instrumental to its anti-terrorism efforts.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The NSA’s mass surveillance program: illegal and opaque","attachmentId":100799515,"attachmentType":"pdf","work_url":"https://www.academia.edu/99809899/The_NSA_s_mass_surveillance_program_illegal_and_opaque","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/99809899/The_NSA_s_mass_surveillance_program_illegal_and_opaque"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="8" data-entity-id="9780772" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/9780772/The_NSA_and_the_Legal_Regime_for_Foreign_Intelligence_Surveillance">The NSA and the Legal Regime for Foreign Intelligence Surveillance</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33534" href="https://osu.academia.edu/PeterShane">Peter M Shane</a></div><p class="ds-related-work--abstract ds2-5-body-sm">This paper both introduces the first major academic symposium on the NSA surveillance programs disclosed by Edward Snowden and lays out the evolution of constitutional and statutory law that positioned the NSA to argue that its programs are lawful.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The NSA and the Legal Regime for Foreign Intelligence Surveillance","attachmentId":35957382,"attachmentType":"pdf","work_url":"https://www.academia.edu/9780772/The_NSA_and_the_Legal_Regime_for_Foreign_Intelligence_Surveillance","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/9780772/The_NSA_and_the_Legal_Regime_for_Foreign_Intelligence_Surveillance"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="9" data-entity-id="29025183" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/29025183/Getting_from_May_We_to_Should_We_at_the_NSA">Getting from “May We?” to “Should We?” at the NSA</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33534" href="https://osu.academia.edu/PeterShane">Peter M Shane</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Jotwell the Journal of Things We Like, 2015</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Getting from “May We?” to “Should We?” at the NSA","attachmentId":57814016,"attachmentType":"pdf","work_url":"https://www.academia.edu/29025183/Getting_from_May_We_to_Should_We_at_the_NSA","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/29025183/Getting_from_May_We_to_Should_We_at_the_NSA"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div></div></div><div class="ds-sticky-ctas--wrapper js-loswp-sticky-ctas hidden"><div class="ds-sticky-ctas--grid-container"><div class="ds-sticky-ctas--container"><button class="ds2-5-button js-swp-download-button" data-signup-modal="{"location":"continue-reading-button--sticky-ctas","attachmentId":84892923,"attachmentType":"pdf","workUrl":null}">See full PDF</button><button class="ds2-5-button ds2-5-button--secondary js-swp-download-button" data-signup-modal="{"location":"download-pdf-button--sticky-ctas","attachmentId":84892923,"attachmentType":"pdf","workUrl":null}"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span>Download PDF</button></div></div></div><div class="ds-below-fold--grid-container"><div class="ds-work--container js-loswp-embedded-document"><div class="attachment_preview" data-attachment="Attachment_84892923" style="display: none"><div class="js-scribd-document-container"><div class="scribd--document-loading js-scribd-document-loader" style="display: block;"><img alt="Loading..." src="//a.academia-assets.com/images/loaders/paper-load.gif" /><p>Loading Preview</p></div></div><div style="text-align: center;"><div class="scribd--no-preview-alert js-preview-unavailable"><p>Sorry, preview is currently unavailable. You can download the paper by clicking the button above.</p></div></div></div></div><div class="ds-sidebar--container js-work-sidebar"><div class="ds-related-content--container"><h2 class="ds-related-content--heading">Related papers</h2><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="0" data-entity-id="1071328" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/1071328/Domestic_intelligence_and_civil_liberties">Domestic intelligence and civil liberties</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="918442" href="https://coloradotech.academia.edu/JamesBurch">James Burch</a></div><p class="ds-related-work--metadata ds2-5-body-xs">SAIS Review, 2004</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Domestic intelligence and civil liberties","attachmentId":6555735,"attachmentType":"pdf","work_url":"https://www.academia.edu/1071328/Domestic_intelligence_and_civil_liberties","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/1071328/Domestic_intelligence_and_civil_liberties"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="1" data-entity-id="45139500" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/45139500/How_Republicans_and_Democrats_Strengthen_Secret_Surveillance_in_the_United_States">How Republicans and Democrats Strengthen Secret Surveillance in the United States</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="63975951" href="https://uj-pl.academia.edu/Pawe%C5%82Laidler">Paweł Laidler</a></div><p class="ds-related-work--metadata ds2-5-body-xs">"Political Preferences", 2019</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"How Republicans and Democrats Strengthen Secret Surveillance in the United States","attachmentId":65711107,"attachmentType":"pdf","work_url":"https://www.academia.edu/45139500/How_Republicans_and_Democrats_Strengthen_Secret_Surveillance_in_the_United_States","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/45139500/How_Republicans_and_Democrats_Strengthen_Secret_Surveillance_in_the_United_States"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="2" data-entity-id="78799677" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/78799677/The_Freedom_of_Information_Act_Shredding_the_Paper_Curtain">The Freedom of Information Act: Shredding the Paper Curtain</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="118948198" href="https://independent.academia.edu/FrankAmoroso">Frank Amoroso</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2012</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Freedom of Information Act: Shredding the Paper Curtain","attachmentId":85717355,"attachmentType":"pdf","work_url":"https://www.academia.edu/78799677/The_Freedom_of_Information_Act_Shredding_the_Paper_Curtain","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/78799677/The_Freedom_of_Information_Act_Shredding_the_Paper_Curtain"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="3" data-entity-id="65227641" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/65227641/Informers_Revisited_Government_Surveillance_of_Domestic_Political_Organizations_and_the_Fourth_and_First_Amendments">Informers Revisited: Government Surveillance of Domestic Political Organizations and the Fourth and First Amendments</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="44091790" href="https://usfca.academia.edu/DoloresDonovan">Dolores Donovan</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2008</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Informers Revisited: Government Surveillance of Domestic Political Organizations and the Fourth and First Amendments","attachmentId":76920840,"attachmentType":"pdf","work_url":"https://www.academia.edu/65227641/Informers_Revisited_Government_Surveillance_of_Domestic_Political_Organizations_and_the_Fourth_and_First_Amendments","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/65227641/Informers_Revisited_Government_Surveillance_of_Domestic_Political_Organizations_and_the_Fourth_and_First_Amendments"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="4" data-entity-id="105529566" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee">The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="272873631" href="https://independent.academia.edu/JohnEastman9">John Eastman</a></div><p class="ds-related-work--metadata ds2-5-body-xs">SSRN Electronic Journal, 2006</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Constitutionality of the NSA Surveillance Program: A Letter to the House Judiciary Committee","attachmentId":104959212,"attachmentType":"pdf","work_url":"https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/105529566/The_Constitutionality_of_the_NSA_Surveillance_Program_A_Letter_to_the_House_Judiciary_Committee"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="5" data-entity-id="71230851" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/71230851/Secret_Evidence_Is_Slowly_Eroding_the_Adversary_System_CIPA_and_FISA_in_the_Courts">Secret Evidence Is Slowly Eroding the Adversary System: CIPA and FISA in the Courts</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="60004501" href="https://independent.academia.edu/ellenyaroshefsky">ellen yaroshefsky</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Hofstra Law Review, 2006</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Secret Evidence Is Slowly Eroding the Adversary System: CIPA and FISA in the Courts","attachmentId":80665986,"attachmentType":"pdf","work_url":"https://www.academia.edu/71230851/Secret_Evidence_Is_Slowly_Eroding_the_Adversary_System_CIPA_and_FISA_in_the_Courts","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/71230851/Secret_Evidence_Is_Slowly_Eroding_the_Adversary_System_CIPA_and_FISA_in_the_Courts"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="6" data-entity-id="7895161" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/7895161/RIP_RIPA_Snowden_Surveillance_and_the_Inadequacies_of_our_Existing_Legal_Framework">RIP RIPA? Snowden, Surveillance, and the Inadequacies of our Existing Legal Framework</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="652585" href="https://demos.academia.edu/CarlMiller">Carl Miller</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Political Quarterly , 2014</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"RIP RIPA? Snowden, Surveillance, and the Inadequacies of our Existing Legal Framework","attachmentId":34380453,"attachmentType":"pdf","work_url":"https://www.academia.edu/7895161/RIP_RIPA_Snowden_Surveillance_and_the_Inadequacies_of_our_Existing_Legal_Framework","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/7895161/RIP_RIPA_Snowden_Surveillance_and_the_Inadequacies_of_our_Existing_Legal_Framework"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="7" data-entity-id="92826700" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/92826700/Aspects_of_the_Executives_Power_Over_National_Security_Matters_Secrecy_Classifications_and_Foreign_Intelligence_Wiretaps">Aspects of the Executive's Power Over National Security Matters: Secrecy Classifications and Foreign Intelligence Wiretaps</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="33851455" href="https://independent.academia.edu/CharlesNesson">Charles Nesson</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Indiana Law Journal, 1974</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Aspects of the Executive's Power Over National Security Matters: Secrecy Classifications and Foreign Intelligence Wiretaps","attachmentId":95732528,"attachmentType":"pdf","work_url":"https://www.academia.edu/92826700/Aspects_of_the_Executives_Power_Over_National_Security_Matters_Secrecy_Classifications_and_Foreign_Intelligence_Wiretaps","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/92826700/Aspects_of_the_Executives_Power_Over_National_Security_Matters_Secrecy_Classifications_and_Foreign_Intelligence_Wiretaps"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="8" data-entity-id="53211070" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/53211070/Government_Surveillance_and_Why_Defining_Privacy_Matters_in_a_Post_Snowden_World">Government Surveillance and Why Defining Privacy Matters in a Post-Snowden World</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="67772416" href="https://independent.academia.edu/KevinMacnish">Kevin Macnish</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Journal of Applied Philosophy, 2016</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Government Surveillance and Why Defining Privacy Matters in a Post-Snowden World","attachmentId":70106752,"attachmentType":"pdf","work_url":"https://www.academia.edu/53211070/Government_Surveillance_and_Why_Defining_Privacy_Matters_in_a_Post_Snowden_World","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/53211070/Government_Surveillance_and_Why_Defining_Privacy_Matters_in_a_Post_Snowden_World"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="9" data-entity-id="17771154" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/17771154/Coming_to_Terms_with_Secret_Law_7_Harvard_National_Security_Journal_241_2015_">Coming to Terms with Secret Law, 7 Harvard National Security Journal 241 (2015)</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="35887535" href="https://independent.academia.edu/DakotaRudesill">Dakota S Rudesill</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2015</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Coming to Terms with Secret Law, 7 Harvard National Security Journal 241 (2015)","attachmentId":44511309,"attachmentType":"pdf","work_url":"https://www.academia.edu/17771154/Coming_to_Terms_with_Secret_Law_7_Harvard_National_Security_Journal_241_2015_","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/17771154/Coming_to_Terms_with_Secret_Law_7_Harvard_National_Security_Journal_241_2015_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="10" data-entity-id="24218370" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/24218370/FAILING_EXPECTATIONS_FOURTH_AMENDMENT_DOCTRINE_IN_THE_ERA_OF_TOTAL_SURVEILLANCE">FAILING EXPECTATIONS: FOURTH AMENDMENT DOCTRINE IN THE ERA OF TOTAL SURVEILLANCE</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="2562751" href="https://fordhamlaw.academia.edu/OlivierSylvain">Olivier Sylvain</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"FAILING EXPECTATIONS: FOURTH AMENDMENT DOCTRINE IN THE ERA OF TOTAL SURVEILLANCE","attachmentId":44548781,"attachmentType":"pdf","work_url":"https://www.academia.edu/24218370/FAILING_EXPECTATIONS_FOURTH_AMENDMENT_DOCTRINE_IN_THE_ERA_OF_TOTAL_SURVEILLANCE","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/24218370/FAILING_EXPECTATIONS_FOURTH_AMENDMENT_DOCTRINE_IN_THE_ERA_OF_TOTAL_SURVEILLANCE"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="11" data-entity-id="81092578" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/81092578/NSA_Management_Directive_424_Secrecy_and_Privacy_in_the_Aftermath_of_Edward_Snowden">NSA Management Directive #424: Secrecy and Privacy in the Aftermath of Edward Snowden</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="25413998" href="https://iapws.academia.edu/GeorgeLucas">George Lucas</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Ethics & International Affairs, 2014</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"NSA Management Directive #424: Secrecy and Privacy in the Aftermath of Edward Snowden","attachmentId":87256782,"attachmentType":"pdf","work_url":"https://www.academia.edu/81092578/NSA_Management_Directive_424_Secrecy_and_Privacy_in_the_Aftermath_of_Edward_Snowden","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/81092578/NSA_Management_Directive_424_Secrecy_and_Privacy_in_the_Aftermath_of_Edward_Snowden"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="12" data-entity-id="7539992" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/7539992/_The_New_Surveillance_Normal_NSA_and_Corporate_Surveillance_in_the_Age_of_Global_Capitalism_2014_Monthly_Review_July_August_2014_66_3_43_53">“The New Surveillance Normal: NSA and Corporate Surveillance in the Age of Global Capitalism" 2014. Monthly Review July-August 2014, 66(3):43-53.</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="3424513" href="https://stmartin.academia.edu/DavidPrice">David Price</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"“The New Surveillance Normal: NSA and Corporate Surveillance in the Age of Global Capitalism\" 2014. Monthly Review July-August 2014, 66(3):43-53.","attachmentId":34104364,"attachmentType":"pdf","work_url":"https://www.academia.edu/7539992/_The_New_Surveillance_Normal_NSA_and_Corporate_Surveillance_in_the_Age_of_Global_Capitalism_2014_Monthly_Review_July_August_2014_66_3_43_53","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/7539992/_The_New_Surveillance_Normal_NSA_and_Corporate_Surveillance_in_the_Age_of_Global_Capitalism_2014_Monthly_Review_July_August_2014_66_3_43_53"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="13" data-entity-id="1644626" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/1644626/The_Freedom_of_Information_Act_and_the_Ecology_of_Transparency">The Freedom of Information Act and the Ecology of Transparency</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="1925180" href="https://upenn.academia.edu/SethKreimer">Seth Kreimer</a></div><p class="ds-related-work--metadata ds2-5-body-xs">University of Pennsylvania Journal of Constitutional …, 2008</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Freedom of Information Act and the Ecology of Transparency","attachmentId":17486636,"attachmentType":"pdf","work_url":"https://www.academia.edu/1644626/The_Freedom_of_Information_Act_and_the_Ecology_of_Transparency","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/1644626/The_Freedom_of_Information_Act_and_the_Ecology_of_Transparency"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="14" data-entity-id="94991884" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/94991884/The_State_Secrets_Privilege_in_the_Post_9_11_Era">The State Secrets Privilege in the Post-9/11 Era</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="180672309" href="https://uic.academia.edu/StevenDSchwinn">Steven D. Schwinn</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Pace Law Review, 2010</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The State Secrets Privilege in the Post-9/11 Era","attachmentId":97297429,"attachmentType":"pdf","work_url":"https://www.academia.edu/94991884/The_State_Secrets_Privilege_in_the_Post_9_11_Era","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/94991884/The_State_Secrets_Privilege_in_the_Post_9_11_Era"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="15" data-entity-id="85271818" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/85271818/FISA_s_Significant_Purpose_Requirement_and_the_Government_s_Ability_to_Protect_National_Security">FISA’s Significant Purpose Requirement and the Government’s Ability to Protect National Security</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="117112944" href="https://lltlab.academia.edu/ScottGlick">Scott Glick</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"FISA’s Significant Purpose Requirement and the Government’s Ability to Protect National Security","attachmentId":90020905,"attachmentType":"pdf","work_url":"https://www.academia.edu/85271818/FISA_s_Significant_Purpose_Requirement_and_the_Government_s_Ability_to_Protect_National_Security","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/85271818/FISA_s_Significant_Purpose_Requirement_and_the_Government_s_Ability_to_Protect_National_Security"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="16" data-entity-id="5819428" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/5819428/THE_QUESTION_OF_EDWARD_SNOWDEN">THE QUESTION OF EDWARD SNOWDEN</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="232635" href="https://queensu.academia.edu/henrylaycock">henry laycock</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"THE QUESTION OF EDWARD SNOWDEN","attachmentId":32829777,"attachmentType":"pdf","work_url":"https://www.academia.edu/5819428/THE_QUESTION_OF_EDWARD_SNOWDEN","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/5819428/THE_QUESTION_OF_EDWARD_SNOWDEN"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="17" data-entity-id="101123262" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/101123262/Access_to_Classified_Information_Constitutional_and_Statutory_Dimensions">Access to Classified Information: Constitutional and Statutory Dimensions</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="267411737" href="https://independent.academia.edu/FeinBruce">Bruce Fein</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Wm. & Mary L. Rev., 1984</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Access to Classified Information: Constitutional and Statutory Dimensions","attachmentId":101750338,"attachmentType":"pdf","work_url":"https://www.academia.edu/101123262/Access_to_Classified_Information_Constitutional_and_Statutory_Dimensions","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/101123262/Access_to_Classified_Information_Constitutional_and_Statutory_Dimensions"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="18" data-entity-id="90572745" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/90572745/Freedom_of_information_legislation_and_the_democratic_oversight_narrative">Freedom of information legislation and the democratic oversight narrative</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="24029999" href="https://kingston.academia.edu/PeterFinn">Peter Finn</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Critical Military Studies, 2019</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Freedom of information legislation and the democratic oversight narrative","attachmentId":94099235,"attachmentType":"pdf","work_url":"https://www.academia.edu/90572745/Freedom_of_information_legislation_and_the_democratic_oversight_narrative","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/90572745/Freedom_of_information_legislation_and_the_democratic_oversight_narrative"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="19" data-entity-id="39102894" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/39102894/The_U_S_Freedom_of_Information_Act_in_Light_of_the_2016_Reform_Some_Theoretical_Issues">The U.S. Freedom of Information Act in Light of the 2016 Reform: Some Theoretical Issues</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="101191577" href="https://bdfinance.academia.edu/MarcoLunardelli">Marco Lunardelli</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Italian Journal of Public Law, 2019</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The U.S. Freedom of Information Act in Light of the 2016 Reform: Some Theoretical Issues","attachmentId":59221825,"attachmentType":"pdf","work_url":"https://www.academia.edu/39102894/The_U_S_Freedom_of_Information_Act_in_Light_of_the_2016_Reform_Some_Theoretical_Issues","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/39102894/The_U_S_Freedom_of_Information_Act_in_Light_of_the_2016_Reform_Some_Theoretical_Issues"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="20" data-entity-id="33488958" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/33488958/Planning_for_Change_Building_a_Framework_to_Predict_Future_Changes_to_the_Foreign_Intelligence_Surveillance_Act">Planning for Change: Building a Framework to Predict Future Changes to the Foreign Intelligence Surveillance Act</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="28426640" href="https://fletc.academia.edu/PatWalsh">Pat Walsh</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Planning for Change: Building a Framework to Predict Future Changes to the Foreign Intelligence Surveillance Act","attachmentId":53529412,"attachmentType":"pdf","work_url":"https://www.academia.edu/33488958/Planning_for_Change_Building_a_Framework_to_Predict_Future_Changes_to_the_Foreign_Intelligence_Surveillance_Act","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/33488958/Planning_for_Change_Building_a_Framework_to_Predict_Future_Changes_to_the_Foreign_Intelligence_Surveillance_Act"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="21" data-entity-id="30894658" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/30894658/Boundaries_of_Law_Exploring_Transparency_Accountability_and_Oversight_of_Government_Surveillance_Regimes">Boundaries of Law Exploring Transparency, Accountability, and Oversight of Government Surveillance Regimes</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="8983336" href="https://oxford.academia.edu/DouweKorff">Douwe Korff</a><span>, </span><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="32496370" href="https://independent.academia.edu/RenataAvila2">Renata Avila</a><span>, </span><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="883818" href="https://columbia.academia.edu/UlfBuermeyer">Ulf Buermeyer</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Boundaries of Law Exploring Transparency, Accountability, and Oversight of Government Surveillance Regimes","attachmentId":51320156,"attachmentType":"pdf","work_url":"https://www.academia.edu/30894658/Boundaries_of_Law_Exploring_Transparency_Accountability_and_Oversight_of_Government_Surveillance_Regimes","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/30894658/Boundaries_of_Law_Exploring_Transparency_Accountability_and_Oversight_of_Government_Surveillance_Regimes"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="22" data-entity-id="21575578" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/21575578/Rethinking_Five_Eyes_Security_Intelligence_Collection_Policies_and_Practice_Post_Snowden">Rethinking 'Five Eyes' Security Intelligence Collection Policies and Practice Post Snowden</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="42703643" href="https://csu-au.academia.edu/AssociateProfessorPatrickWalsh">Professor Patrick F Walsh</a><span>, </span><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="6289482" href="https://csu-au.academia.edu/SeumasMiller">Seumas Miller</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Rethinking 'Five Eyes' Security Intelligence Collection Policies and Practice Post Snowden","attachmentId":42114401,"attachmentType":"pdf","work_url":"https://www.academia.edu/21575578/Rethinking_Five_Eyes_Security_Intelligence_Collection_Policies_and_Practice_Post_Snowden","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/21575578/Rethinking_Five_Eyes_Security_Intelligence_Collection_Policies_and_Practice_Post_Snowden"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="23" data-entity-id="51762302" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/51762302/The_Snowden_Stakes_Challenges_for_Understanding_Surveillance_Today">The Snowden Stakes: Challenges for Understanding Surveillance Today</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="45094720" href="https://independent.academia.edu/DavidLyon8">David Lyon</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Surveillance & Society</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Snowden Stakes: Challenges for Understanding Surveillance Today","attachmentId":69341862,"attachmentType":"pdf","work_url":"https://www.academia.edu/51762302/The_Snowden_Stakes_Challenges_for_Understanding_Surveillance_Today","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/51762302/The_Snowden_Stakes_Challenges_for_Understanding_Surveillance_Today"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="24" data-entity-id="102351163" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/102351163/Societal_Opinon_of_Government_and_Private_Agencies_Surveillance_Capabilities_Post_9_11">Societal Opinon of Government and Private Agencies' Surveillance Capabilities Post 9-11</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="42693376" href="https://independent.academia.edu/KaplanStephanie">Stephanie Kaplan</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2017</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Societal Opinon of Government and Private Agencies' Surveillance Capabilities Post 9-11","attachmentId":102644700,"attachmentType":"pdf","work_url":"https://www.academia.edu/102351163/Societal_Opinon_of_Government_and_Private_Agencies_Surveillance_Capabilities_Post_9_11","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/102351163/Societal_Opinon_of_Government_and_Private_Agencies_Surveillance_Capabilities_Post_9_11"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div></div><div class="ds-related-content--container"><h2 class="ds-related-content--heading">Related topics</h2><div class="ds-research-interests--pills-container"><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="534" href="https://www.academia.edu/Documents/in/Law">Law</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="3680" href="https://www.academia.edu/Documents/in/Courts">Courts</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="41234" href="https://www.academia.edu/Documents/in/Administrative_Law">Administrative Law</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="281994" href="https://www.academia.edu/Documents/in/Judiciary">Judiciary</a></div></div></div></div></div><div class="footer--content"><ul class="footer--main-links hide-on-mobile"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px; position: relative; bottom: -1px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a href="https://support.academia.edu/"><svg style="width: 12px; height: 12px; position: relative; bottom: -1px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer--research-interests"><li>Find new research papers in:</li><li><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul><ul class="footer--legal-links hide-on-mobile"><li><a href="https://www.academia.edu/terms">Terms</a></li><li><a href="https://www.academia.edu/privacy">Privacy</a></li><li><a href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2024</li></ul></div> </body> </html>